1/8 🚨 SECURITY ALERT: A victim lost 143.45 ETH ($460,895) through transaction simulation spoofing 1 day ago.
Here's how these attacks work... 🧵
2/8 📱 Transaction simulation is a feature in modern Web3 wallets that shows users the expected outcome of their transactions before signing.
This feature aims to improve transparency and user experience. 🔍
3/8 ⚠️ However, attackers exploit the delay between simulation and execution.
They create phishing sites that manipulate on-chain states immediately after transaction submission. 🕒
4/8 💻 The attack sequence:
• Phishing site initiates a "Claim" ETH transfer
• Wallet simulates tiny ETH receipt (0.000...0001 ETH)
• Backend modifies contract state
• Actual transaction drains wallet
5/8 ⚡ Recent example analysis:
• Phishing site modified contract state
• Victim signed transaction ~30 seconds after state change
• Claim function executed
• Resulted in complete wallet drain
All appearing legitimate in simulation ⛓️
🧵 [1/6] 🚨 ScamSniffer's April Phishing Report 🚨
April saw a significant decrease in losses from phishing attacks, with 34,000 victims losing $38 million.
This is a 46% drop compared to last month. 📉
🧵 [2/6] Despite the overall decline, theft on the Base chain saw a substantial increase of 145% from the previous month.
Notably, 2 of the top 10 largest single thefts occurred on this chain, accounting for 21% of the month's total theft.
🧵 [3/6] 🪙 A whopping 88% of the stolen assets were ERC20 tokens.
Most thefts were due to phishing signatures like Permit, IncreaseAllowance, and Uniswap Permit2, leading to significant losses.
Please do more research when you meet these signatures.🛡️